Archive for April, 2014

best-it-trainer-certs

Plenty fast way to be MCSE 2012 in 2014

This is to certify that MCSE 2012 can get you carrier boost and you can get the job worth $95,276,

The first question that come in your mind how long it will take got get prepared and become MCSE certified?.

If is say in on week!
How?
I mean wow!
Yahoo! it is possible.

If you currently hold the MCSA: Windows Server 2008 or one of the Microsoft Certified IT Professional (MCITP) certs, you can upgrade to:
MCSE: Server Infrastructure,
MCSE: Desktop Infrastructure,
MCSE: Private Cloud.

Each upgrade requires you to pass three exams, and by no coincidence whatsoever, Microsoft is offering a 3-exams-for-the-price of-two deal through May 31, 2014.

First you need to understand the complete structure of the Microsoft MCSE 2012 certification, understand the concepts and off-course you need learn and get some training. ( are you think of getting the certification without any training, I say you can and but after that you cannot fit in the job)

Let Me Explain:
Microsoft Certified Solutions Expert (MCSE) credentials, have long ruled the hearts and minds of those who work on Microsoft-based systems and servers. The newly polished offerings have been simplified, and focus on the latest technologies.

MCSE certification, which recognizes advanced skills for running a data center. An MCSE is well-versed in networking and virtualization, and managing systems, identity and authorization, and storage.

MCSE 2012
The globally recognised standard for IT Professionals
Demonstrate your ability to build innovative solutions across multiple technologies, both on-premises and in the cloud.

As For Training
You need find one, but I suggest find a online training provider. this will best solution, you can learn with in the comfort of your time and convince.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCSE Training at certkingdom.com

Exclusive: Google may offer Wi-Fi for cities with its Google Fiber

Cities getting gigabit-speed fiber Internet could also gain Wi-Fi networks

Google is considering deploying Wi-Fi networks in towns and cities covered by its Google Fiber high-speed Internet service.

The disclosure is made in a document Google is circulating to 34 cities that are the next candidates to receive Google Fiber in 2015.

Specific details of the Wi-Fi plan are not included in the document, which was seen by IDG News Service, but Google says it will be “discussing our Wi-Fi plans and related requirements with your city as we move forward with your city during this planning process.”

If the plan goes ahead, it would be a further step by Google toward competition with traditional telecom carriers. For citizens of the cities involved, it could mean increased reliance on services by the dominant Internet company.

Google declined to answer specific questions about the plans but in an emailed statement said, “We’d love to be able to bring Wi-Fi access to all of our Fiber cities, but we don’t have any specific plans to announce right now.”

Google Fiber is already available in Provo, Utah, and Kansas City, and is promised soon in Austin, Texas. It delivers a “basic speed” service for no charge, a gigabit-per-second service for US$70 per month and a $120 package that includes a bundle of more than 200 TV channels. Installation costs between nothing and $300.

Google has sent the 34 cities that are next in line for Google Fiber a detailed request for information and they have until May 1 to reply.

It asks for a list of all the addresses in each city and a description of building types, and requests numerous geospatial data files containing information on streets, boundaries, rights of way, manholes, utility poles, zoning types and the condition of pavement across the city.

Google is also asking cities to identify locations it would be able to install utility huts. Each 12-foot-by-30-foot (3.6-meter-by-9.1-meter) windowless hut needs to allow 24-hour access and be on land Google could lease for about 20 years.

The huts, of which there will be between one and a handful in each city, would house the main networking equipment. From the hut, fiber cables would run along utility poles — or in underground fiber ducts if they exist — and terminate at neighborhood boxes, each serving up to 288 or 587 homes.

The neighborhood boxes are around the same size or smaller than current utility cabinets often found on city streets.

Once each municipality has sent the information to Google, the Mountain View company said it will conduct a detailed study.

“This process will take some time, but we hope to have updates on which cities will get Fiber by the end of the year,” the company says in the document.


 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCSE Training at certkingdom.com

2014 IT Salary Survey: Highlights

Computerworld’s survey of more than 3,500 IT pros shows that those with the right mix of technical skills and business savvy are in demand. Here’s a look at trends in workers’ job and pay satisfaction, along with their job security and stress levels.

T worker reality check
How do tech workers feel about their pay, stress levels and long-term career prospects? Which skills are most in demand among managers hiring for IT positions in 2014? Computerworld’s 28th annual salary survey found those answers and more.

We polled 3,673 IT professionals, 99% of whom report being employed full time. Thirty-seven percent say they work in management, while 63% report holding IT staff positions.

Fifty-five percent say they have some kind of IT certification, 24% have a master’s degree and 2% report having a Ph.D. The average age of all respondents is 47.

Read on for 2014 salary data and respondents’ thoughts on the state of the IT industry.

Compensation inches up
IT salaries continue to nose forward, averaging a modest 2.1% increase in pay in 2014, compared with 2.3% in 2013. Average bonuses are up only 0.7%, slightly slower than the 0.9% increase seen in 2013.

On the bright side, companies are spreading pay increases among more IT workers. Some 60% of respondents report a raise versus only 8% reporting a pay cut, compared with 57% reporting a raise and 9% reporting a pay cut in 2013. In 2012, less than half reported a raise..

Skills in demand
While IT compensation may be stuck in low gear overall, the hiring market for workers with the right skills is becoming highly competitive. Application development remains the most in-demand skill, selected as a growth area by 49% of managers who plan to hire IT staff in the next 12 months.

Other hot skills include help desk/IT support, business intelligence, and database analysis and development, all of which rose by 5 or more percentage points from 2013 as key hiring areas for IT managers. Some 63% of open IT jobs are highly skilled specialist positions, while 33% are staff or entry-level positions.

Open positions cause concern
With demand outpacing supply for many positions, 54% of survey takers say a headhunter has contacted them in the past year. Perhaps not coincidentally, IT managers are struggling to fill open positions; half of the managers surveyed by Computerworld report that it has taken at least three months to fill open IT positions in the last two years.

While positions remain unfilled, projects pile up for current IT employees. Some 26% of respondents said that in the past year their working conditions were significantly affected by unfilled open positions, compared to 20% in 2013. A third of survey-takers said they were affected by new understaffed projects.

Pay grade
When it comes to salaries and bonuses, slightly more than half of survey respondents (53%) report they are satisfied or very satisfied with their total compensation, while 23% say they are dissatisfied or very dissatisfied. Only 18% are less satisfied with their compensation this year than they were at this time last year.

However, when asked if they think they are paid fairly, 52% say they are underpaid based on their role and responsibility, and only 23% feel that their salary is keeping pace with business growth and demands.

In terms of overall financial picture, 39% of respondents feel that they have stayed flat over the past two years of their career, 31% believe they have gained ground, and 30% feel they have lost ground.

Job satisfaction
A solid majority — 63% — of respondents report being very satisfied or satisfied with their current job, with 19% saying they are more satisfied now than they were 12 months ago.

When asked where they expect to be in their career five years from now, 41% think they’ll still have their current job or a similar job at another company, 37% predict they’ll be in a higher-level position, 18% expect to be retired or self-employed, and 4% say they’ll have left the IT profession altogether.

Peace of mind
As the economy has improved, the percentage of respondents who feel secure or very secure in their jobs has also inched up, from 57% in 2012 to 59% in 2013 and up to 61% this year. However, 20% of respondents report that they felt more secure in their jobs 12 months ago.

Overall, respondents view a career path in IT as slightly more secure than other career paths: 48% feel it is more secure than most career paths, while 41% feel it is as secure as most other career paths. Only 11% feel it is less secure than most other career paths.

Workload tension
Overall, the percentage of respondents who feel their job is stressful or very stressful has shown a slight decline over the past few years, from 50% in 2011 down to 46% in the current study.

However, workloads remain a concern: A whopping 84% of survey takers say they’ve felt pressure to increase productivity, take on new tasks, or both — and only 11% say their salary has been adjusted to compensate for the added workload. What’s more, 68% of respondents say they expect their workload and responsibilities to increase over the next 12 months.

Tied to work
Part and parcel with workload worries is the pressure many IT pros feel to communicate with the office during non-work hours, including during vacations. Some 55% of our survey respondents report that they check in frequently or very frequently on weekends, evenings and other nontraditional work hours. (See “The ‘always-on’ IT culture: Get used to it” for ways to cope.)

Changing priorities
Each year we ask survey respondents to choose the five most important factors about their jobs. While base pay remains the highest-ranked factor, its 49% response rate is down sharply from 68% in 2013 and 73% in 2012. Other traditional workplace rewards such as benefits and bonus opportunities saw similar drops.

In the same time period, job atmosphere and community, being valued for one’s opinion and knowledge, and other “soft” factors are up 7 or more percentage points, suggesting that IT staffers are placing more importance on intangibles such as corporate culture, challenging work and recognition — a trend that employers ignore at their peril.

(See “What do IT workers want?” for insight into why workers’ values are changing and how employers can keep up.)

Happy in the long run
As the economic recovery continues, workers are feeling more optimistic about IT as a career: While only 29% believed that a career path in IT and the potential for salary advancement was as promising in 2012 as it was five years prior, that percentage increased to 38% in 2013 and to 42% this year.

In the end, most IT pros are happy with their career choice: 84% say they’re satisfied or very satisfied with their decision to pursue a career in IT.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft Patch Tuesday bids adieu to Windows XP

Microsoft will no longer issue security patches for Windows XP

This month’s “Patch Tuesday” includes the final round of security fixes Microsoft will issue for Windows XP, potentially leaving millions that continue to use the OS open to attack.

XP will become an easy target for attackers now that Microsoft has stopped supporting it, said Wolfgang Kandek, CTO for IT security firm Qualys.A The OS will no longer receive fixes for holes that Microsoft and others might find in the OS. Moreover, attackers will be able to reverse engineer patches issued for newer versions of Windows, giving them clues to the remaining unfixed vulnerabilities in XP, Kandek said.

Microsoft has acknowledged the problem and has been pushing hard to get users onto newer versions of Windows.

“If you continue to use Windows XP now that support has ended, your computer will still work but it might become more vulnerable to security risks and viruses,” it said in an advisory.

Its efforts haven’t always been successful. Qualys compiled data from 6,700 companies and found that use of XP still represents a sizable portion of OSes running in the enterprise.A About one-fifth of companies in finance, for instance, still use XP — a surprisingly large number for an industry handling sensitive data. A

In retail, 14 percent of PCs still run XP, and in heath care the figure is 3 percent.

Organizations may be holding off on updating for a number of reasons, Kandek said. Some didn’t realize support was closing and are just now putting a migration plan in place. Others may be taking a calculated risk, saving on the cost of an upgrade and trying to minimize exposure by limiting access to the Internet and through other measures.

In addition to ending support for XP, Microsoft is no longer supporting Office 2003 or Internet Explorer 8.

The company released four security updates altogether on Tuesday. They cover 11 vulnerabilities in Windows, Internet Explorer, Microsoft Office and Microsoft Publisher. Two of the updates are marked as critical. One of those, MS14-018, fixes a number of issues with Internet Explorer. The other, MS14-017, addresses critical vulnerabilities in Microsoft Word and Office Web Apps. They include a zero day in how Office 2010 handles documents encoded in the Rich Text Format.

Even after that fix is applied, organizations might want to disable Word’s ability to open RTF files, if those types of files aren’t routinely used, Kandek advised.A

The two other updates in April’s round of patches were marked important. One of them, MS14-020, handles a vulnerability in the company’s Publisher program. The other, MS14-019, covers how Windows, including XP, handles files.

Kandek also advised administrators to apply the patch Adobe issued Tuesday for a serious vulnerability in its Flash multimedia software.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

Patch Tuesday: Final Microsoft support for Windows XP addresses Internet Explorer problems

It is a light month from Microsoft lacking a flurry of last-second patches for XP

Microsoft’s final patches for Windows XP that come out next week focus on critical problems with older versions of Internet Explorer that can result in malicious code being run remotely on victim machines.

Internet Explorer 6, 7 and 8 that operate within Windows XP are all being patched in the April Microsoft Security Bulletins, as are vulnerabilities in Windows XP itself that are ranked as important but not critical.

These final XP patches come out April 8 and so represent the end of support for the operating system.

Internet Explorer patches are a routine piece of every month’s bulletins, says Russ Ernst, director product management at Lumension. “The second bulletin is the now-expected cumulative update for Internet Explorer,” he says. “It’s also rated critical and of course key for the many IE users out there.”

Other than the historical XP significance of the bulletins this month, they are otherwise unremarkable. There are just four of them, two critical and two rated important. The difference between them is that the important ones require action by the victim – such as clicking on a link – while the critical ones don’t.

The second critical bulletin affects all versions of Office and addresses vulnerabilities and active attacks identified last week in an advisory from Microsoft that offered up a workaround until this permanent fix was ready. “This is a critical vulnerability that could allow remote code execution if a user opens a RTF file in Word 2010 or in Outlook while using Word as the email viewer,” Ernst says.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

 

70-647 PRO: Windows Server 2008,Enterprise Administrator


QUESTION 1
You work as an enterprise administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers in the ABC.com network run Windows Server 2008.
The ABC.com network has a file server named ABC-SR07 that hosts a shared folder named
ABCDocs. Several Microsoft Word documents are stored in the ABCDocs share. You want to
enable document version history on these documents. You also want the documents in the
ABCDocs share to be accessed through a Web page.
Which of the following roles or services would you install on ABC-SR07 to achieve the desired
results cost effectively?

A. FTP Server role.
B. Application Server role.
C. Microsoft Windows SharePoint Services (WSS) 3.0.
D. File and Print Services role.
E. Microsoft Office SharePoint Server (MOSS) 2007.
F. SMTP Server role.

Answer: C

Explanation:
To achieve the desired results without requiring any additional cost, you need to use Microsoft
Windows SharePoint Services (WSS) 3.0.
Reference: Microsoft Windows SharePoint Services 3.0 and the Mobile Workplace

http://download.microsoft.com/download/b/b/6/bb6672dd-252c-4a21-89de-

78cfc8e0b69e/WSS%20Mobile%20Workplace.doc


QUESTION 2
You work as an enterprise administrator at ABC.com. The ABC.com network has a domain named
ABC.com with a single site named Site
A. All servers in the ABC.com network run Windows Server
2008.
You reorganize the Active Directory infrastructure to include a second site named SiteB with its
own domain controller.
How would you configured the firewall to allow replication between SiteA and SiteB?

A. Enable IPSec traffic to pass through the firewall.
B. Enable RPC traffic to pass through the firewall.
C. Enable SMTP traffic to pass through the firewall.
D. Enable NNTP traffic to pass through the firewall.
E. Enable FTP traffic to pass through the firewall.

Answer: B

Explanation:
You should permit RPC traffic through the firewall to enable the domain controllers to replicate
between the two sites because the Active Directory relies on remote procedure call (RPC) for
replication between domain controllers. You can open the firewall wide to permit RPC’s native
dynamic behavior.
Reference: Active Directory Replication over Firewalls

http://technet.microsoft.com/en-us/library/bb727063.aspx


QUESTION 3
You work as an enterprise administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers in the ABC.com network run Windows Server 2008.
ABC.com runs a critical application that accesses data that is stored in a Microsoft SQL Server
2005 database server named ABC-DB02. Which of the following options would you choose to
ensure that the database is always available?

A. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a
Network Load Balancing (NLB) cluster.
B. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
Network Load Balancing (NLB) cluster
C. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a failover
cluster.
D. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
failover cluster.

Answer: D

Explanation:
To ensure the high availability of the data store, you need to use a Windows Server 2008 failover
cluster with shared storage.
Failover clustering can help you build redundancy into your network and eliminate single points of
failure.
Administrators have better control and can achieve better performance with storage than was
possible in previous releases. Failover clusters now support GUID partition table (GPT) disks that
can have capacities of larger than 2 terabytes, for increased disk size and robustness.
Administrators can now modify resource dependencies while resources are online, which means
they can make an additional disk available without interrupting access to the application that will
use it. And administrators can run tools in Maintenance Mode to check, fix, back up, or restore
disks more easily and with less disruption to the cluster
You should not use Network Load Balancing (NLB) because it only allows you to distribute TCP/IP
requests to multiple systems in order to optimize resource utilization, decrease computing time,
and ensure system availability.
Reference: High Availability

http://www.microsoft.com/windowsserver2008/en/us/high-availability.aspx


QUESTION 4
You work as an enterprise administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers in the ABC.com network run Windows Server 2008. ABC.com has its
headquarters in Chicago and sub-divisions in Boston, Atlanta, Miami and Dallas. All domain
controllers are currently installed in the Chicago.
You need to have new domain controllers installed in the Boston, Atlanta, Miami and Dallas subdivisions.
ABC.com issues a security policy for the new domain controllers that states the
following:
•Unauthorized user must not be able to access the Active Directory database.
•Unauthorized user must not be able to boot a domain controller from an alternate boot disk.
Which of the following options would you choose to implement the security policy?

A. Modify the permissions of the ntds.dat file.
B. Configure a read-only domain controller (RODC) in the Boston, Atlanta, Miami and Dallas.
C. Disable replication of the Sysvol folder on the new domain controllers.
D. Configure Windows BitLocker Drive Encryption (BitLocker) on the new domain controllers.
E. Disable the Global Catalog role on the new domain controllers.
F. Configure EFS encryption on the new domain controllers.

Answer: D

Explanation:
To configure domain controller at each branch office to ensure that no unauthorized user should
be allowed to copy the Active Directory database from a branch office domain controller by starting
the server from an alternate startup disk, you need to use Windows BitLocker Drive Encryption
(BitLocker)
BitLocker allows you to encrypt all data stored on the Windows operating system volume and use
the security of using a Trusted Platform Module (TPM) that helps protect user data and to ensure
that a computer running Windows Vista or Server 2008 have not been tampered with while the
system was offline.
In addition, BitLocker offers the option to lock the normal startup process until the user supplies a
personal identification number (PIN) or inserts a removable USB device, such as a flash drive, that
contains a startup key. This process will ensure that users can only access all files on the servers
if they have the PIN. You cannot use an alternate startup disk to boot the server.
Reference: BitLocker Drive Encryption Technical Overview

http://technet2.microsoft.com/windowsserver2008/en/library/a2ba17e6-153b-4269-bc46-

6866df4b253c1033.mspx?mfr=true


QUESTION 5
You work as an enterprise administrator at ABC.com. The ABC.com network has a domain named
ABC.com that runs at the domain functional level of Windows Server 2008.
Which of the following options can be used for tracking any modification to Active Directory
Objections?

A. Configure a Group Policy to run the Security Configuration Wizard on all computers in the ABC
network.
B. Configure the Default Domain Controllers Group Policy to audit Directory Services.
C. Configure the Default Domain Group Policy to audit Directory Services.
D. Enable auditing of the ntds.dat file in the Default Domain Group Policy.
E. Enable auditing of the ntds.dat file in the Default Domain Group Policy.

Answer: B

Explanation:
To implement an audit and compliance policy and ensure that all changes made to Active
Directory objects are recorded, you need to configure a Directory Services Auditing policy in the
Default Domain Controller Policy
In Windows Server 2008, you can enable Audit Directory Service Access policy to log events in
the Security event log whenever certain operations are performed on objects stored in Active
Directory.
Enabling the global audit policy, Audit directory service access, enables all directory service policy
subcategories. You can set this global audit policy in the Default Domain Controllers Group Policy
(under Security Settings\Local Policies\Audit Policy).
Reference: Windows Server 2008 Auditing AD DS Changes Step-by-Step Guide

http://technet2.microsoft.com/windowsserver2008/en/library/a9c25483-89e2-4202-881cea8e02b4b2a51033.

mspx?mfr=true


MCTS Training, MCITP Trainnig

Best Microsoft MCITP Enterprise Administrator Certification,
MCITP 70-647 Training at certkingdom.com

Go to Top